Exam 1

Ace your homework & exams now with Quizwiz!

A social business strategy needs to align itself with the organization's IT strategy but not the business strategy. True or False?

False

Once a firm is out of alignment, it does not mean that it has to stay that way. True or False?

True

To avoid unwanted consequences, altering the IT Strategy requires adjustments to the organizational strategy. True or False?

True

An "evil twin" in the context of computer security is: a) A counterfeit wifi connection in a hotel or coffee shop that appears to be genuine b) A virus-laden attachment that looks just like a sincere attachment c) Someone who looks just like the Chief Information Officer, but steals data d) An operating system that is not genuine e) A duplicate badge that allows a nasty person entry into a data center

a) A counterfeit wifi connection in a hotel or coffee shop that appears to be genuine

All of the following are classic signs of a phishing message except: a) An emailed ad oddly does not provide any active links b) Goods or services are offered at an impossibly low price c) Poor grammar or spelling in a note that purports to be from a large company d) You just won a lottery or contest, and you need to click on a link to claim your prize e) Your email in-box is full and you must click on a link to increase storage

a) An emailed ad oddly does not provide any active links

A company that is in a market with few buying options for the consumer is enjoying a high amount of which one of Porter's Five Competitive Forces? a) Bargaining power of suppliers b) Threat of substitute products c) Potential threat of new entrants d) Bargaining power of buyers e) Industry competitors

a) Bargaining power of suppliers

Enterprise Rent-A-Car was able to model and better understand how service requests were handled and then optimize the process, greatly benefiting the customer experience. Enterprise achieved this benefit using which tool? a) Business Process Management (BPM) b) Six sigma c) New Product Development (NPD) d) Product life cycle management e) Radical redesign

a) Business Process Management (BPM)

Who is responsible for decisions about security strategy? a) Business leaders b) IT people c) Shared: IT leaders and business leaders d) Team of consultants and IT people e) Consultants

a) Business leaders

A strategy where companies cooperate and compete at the same time with companies in its value net: a) Co-opetition b) Teamwork c) Classwork d) Strategic Alliance e) Risk

a) Co-opetition

Partnering with a competitor is becoming more and more common in today's integrated, technology-based environment. This type of collaboration with a competitor is uniquely described as: a) Co-opetition b) Integrated supply chain c) Business process d) Strategic alliance e) Value proposition

a) Co-opetition

Two automobile manufacturers are working together to develop hybrid technology. This type of relationship between the two automobile manufacturers is best described as: a) Co-opetition b) Strategic alliance c) Competition d) Collaboration e) Business strategy

a) Co-opetition

To help employees accept new technologies like an information system, a manager will do all of the following EXCEPT:GE recognized that it could only sustain its competitive advantage for a limited time as competitors attempted to outmaneuver them. What was the model that Welch applied to help solve this problem? a) Destroy your business b) Grow your system c) Destroy your system d) Grow your organization e) Destroy your organization

a) Destroy your business

These are comprehensive software packages that incorporate all modules needed to run the internal operations of a business. They should include the following modules: Manufacturing, Accounting, Human Resources and Sales. a) ERP systems b) Groupware system c) CRM systems d) SCM systems e) PLM systems

a) ERP systems

All of the following are characteristics of an ERP system EXCEPT: a) ERP systems work "out of the box" with little configuration requirements. b) ERP systems have evolved to support newer IT architectures. c) ERP systems provide seamless integration of information flow across the organization. d) ERP systems provide best (or at least "very good") practices for generic business processes. e) ERP systems are usually software packages obtained from a provider/vendor.

a) ERP systems work "out of the box" with little configuration requirements.

All of the following are new types of jobs created by the growing reliance on technology EXCEPT: a) Editors/writers b) Web site designers c) Network security advisor d) Social media specialists e) Database administrator

a) Editors/writers

Reengineering is all of the following except: a) Gradual and systematic b) Associated with very high reward if it succeeds c) Threatening to employees d) Associated with quick rewards if it succeeds e) Sometimes suspected to be used to justify downsizing

a) Gradual and systematic

Traditional organizations have one of four types of organizational design. What are these four structure types? a) Hierarchical, flat, matrix, networked b) Matrix, flat, networked, traditional c) Traditional, flat, matrix, technology d) Social, networked, matrix, hierarchical e) Matrix, networked, flat, information

a) Hierarchical, flat, matrix, networked

The major difference between an ERP and ERP II system is this feature. a) Information is made immediately available to external stakeholders using social and collaborative tools b) Information is made available to all departments in the company c) Advanced quering and reporting capabilities d) Advances in software usability and flexibility e) Close integration with e-business technologies

a) Information is made immediately available to external stakeholders using social and collaborative tools

Porter's value chain framework suggests that a competitive advantage can stem from: a) Lowering costs and adding value b) Reducing isolated costs c) Disregarding customer data d) Optimizing internal costs e) Improving customer service

a) Lowering costs and adding value

All of the following are robust platforms EXCEPT for _________. a) MS Office 2016 b) Windows 10 c) Mac OSX d) Android KitKat e) iPhone IOS 9

a) MS Office 2016

The "Managerial Levers" concept is useful for the following reasons: a) Management should not make a change unless they align multiple issues, such as tasks, measures, values, incentives, etc. b) System investments need to be financially highly leveraged. c) All of the above. d) None of the above. e) Management can find what "levers" to push to force people to do what they want.

a) Management should not make a change unless they align multiple issues, such as tasks, measures, values, incentives, etc.

Mohawk's need for flexibility required a change to its IT architecture. SOA was chosen by Mohawk because Mohawk: a) Needed to be able to scale up or down operations as called for by the market or by its own arrangements with suppliers. b) Believed that SOA provides the appropriate level of security it did not have with its original architecture. c) Benefited from standardizing on the SAP suite of products and reducing its reliance on multiple vendors. d) Wanted to eliminate the dependency on its ERP system. e) Needed to upgrade its infrastructure components to meet the increased IT demands.

a) Needed to be able to scale up or down operations as called for by the market or by its own arrangements with suppliers.

In which type of organizational structure is power distributed, and particularly suited for an environment that is dynamic and unstable? a) Networked b) Flat c) Hybrid d) Hierarchical e) Matrix

a) Networked

Sloan Valve Company redesigned their new product development process and as a result greatly reduced time-to-market as well as improved quality. Which one of the following enterprise systems supported Sloan's transformation? a) PLM b) NPD c) TQM d) SCM e) ERP

a) PLM

Business strategies based on hypercompetition focus on customer satisfaction and profit maximization but also build in a component of business intelligence. Business intelligence helps an agile organization to: a) Predict and respond to new opportunities b) Use current information technologies less extensively c) React to supplier demands d) Manage internal challenges e) Collaborate

a) Predict and respond to new opportunities

When using information technologies to collect data for the purpose of monitoring workers, a manager should do all of the following EXCEPT: a) Require workers to complete additional tasks. b) Consider the privacy rights of individuals. c) Inform employees when and what is being monitored. d) Ensure monitoring is meaningful to the organization's mission. e) Capture qualitative inputs in addition to quantitative data.

a) Require workers to complete additional tasks.

Which "view," applied in the area of Information Systems, helps identify two subsets of information resources: those that enable a firm to attain competitive advantage and those that enable a firm to sustain the advantage over the long-term? a) Resource-Based View b) Information-System View c) Information-Resource View d) System-Based View e) Organization View

a) Resource-Based View

During an ice storm, JetBlue Airlines had an IT infrastructure that demonstrated which one of the following technical issues? a) Scalability b) Standardization c) Maintainability d) Adaptability e) Security

a) Scalability

L.L. Bean is an online/catalog retail company that aggressively uses tools like instant messaging to communicate with customers regarding potential purchases and uses Facebook for branding activities. This use of technology supports which strategy? a) Social business strategy b) Mission strategy c) Organizational strategy d) Business strategy e) IS strategy

a) Social business strategy

Suppose Zara has a linked supply chain with Silk City, a fabric supplier. Zara and Silk City use IT to seamlessly exchange data, communicating requirements as well as delivery expectations. The relationship between Zara and Silk City is best described as: a) Strategic alliance b) Co-opetition c) Collaboration d) Dependence e) Competition

a) Strategic alliance

The Nike + iPod Sports Kit is a sensor in your shoe that syncs with your iPod and provides details about your workout. This inter-organizational relationship affords both Nike and Apple a business advantage. This relationship between Nike and Apple is best described as: a) Strategic alliance b) Co-opetition c) Collaboration d) Dependence e) Competition

a) Strategic alliance

This model suggests that employee attitudes may change if they think the new system will help them to do more or better work for the same effort, and that it's easy to use. Employee participation in the system's design and implementation also helps. a) Technology Acceptance Model (TAM) b) Employee Technology Model (ETM) c) Information Management Model (IMM) d) Computer Access Model (CAM) e) Capability Maturity Model (CMM)

a) Technology Acceptance Model (TAM)

All of the following are good metrics a firm can use to measure the success of a business process EXCEPT for: a) The change in demographics of a region. b) A customer's satisfaction with the quality of the product received. c) Revenue received from a service. d) The number of orders the customer places in a given timeframe. e) The time elapsed from when the customer placed an order to the time the product is received.

a) The change in demographics of a region.

When the Office of Personnel Management was hacked, all of the following are true except: a) The hackers gained access to the building to steal the records b) The hackers did not need to escape in the blue turbocharged vehicle c) It took the Office of Personnel Management many months to detect the break-in d) The hackers likely exploited a stolen password e) None of the above (indicating that all are true)

a) The hackers gained access to the building to steal the records

Organizations use the enterprise system to drive the redesign of a business process (rather than the process driving the system implementation) for all of the following reasons EXCEPT: a) The organization has highly specialized processes that are not seen as best practices. b) The organization is just starting out and has no defined processes. c) The business process itself is not seen as a competitive strategic advantage. d) There is little time or resources to deviate from best practices. e) The needs of the business are met by the enterprise system.

a) The organization has highly specialized processes that are not seen as best practices.

An effective workflow diagram should do all of the following EXCEPT: a) Try to mask the steps of a business process b) Identify inputs and outputs of a process c) Identify all persons/roles who play a part in the process d) Use active verbs to describe activities e) Map the sequence and details of a business process

a) Try to mask the steps of a business process

Spoofing is: a) When the "from" address says the name/email address of a person different from who really sent it b) When hackers snoop around in a system c) When a person from IT unlocks your email account d) When someone makes fun of you for falling for a phishing scam e) When you receive a notice of an inheritance

a) When the "from" address says the name/email address of a person different from who really sent it

Which is not a question that can be used to understand organizational design? a) Where is the organization's headquarters located? b) Who holds the decision rights to critical decisions? c) What are the key business processes? d) What is the culture of the organization? e) What are the characteristics, experiences, and skill levels of the people within the organization?

a) Where is the organization's headquarters located?

The main benefit of ________________ is that users can work collaboratively to easily create and edit Web pages, and link them to useful resources. a) a Wiki b) a Virtual Private Network c) RSS (web feeds) d) Groupware e) Social networking sites

a) a Wiki

Before Kaiser Permanente adopted its new business strategy, its IS Strategy Triangle was out of __________. a) alignment b) specification c) control d) scope e) adjustment

a) alignment

On the black market, stolen data in a "kit" that contains credit card information plus social security number and medical information is worth: a) between $100 and $1,000 per record b) between $4,520 and $4,580 per record c) between $13 and $18 per recorded d) between $43 and 65 per record e) between $145 and $154 per record

a) between $100 and $1,000 per record

The organizational structure of Tata Consulting Services (TCS) is a ___________ organizational structure. a) hierarchical b) matrix c) flat d) zero time e) networked

a) hierarchical

Cognizant's organizational structure was ________, but realized as its organization grew and its services became more complicated that a __________ structure for the organization was more appropriate. a) hierarchical, matrix b) matrix, networked c) flat, hierarchical d) hierarchical, networked e) flat, matrix

a) hierarchical, matrix

Organizational, cultural, and control variables are considered the ________ used by decision makers to effect change in their organization. a) managerial levers b) events c) IS d) organization objectives e) collaboration tools

a) managerial levers

A legacy system is all of the following, except: a) Usually found on a mainframe. b) A system that often holds the middle tier of a multiple-tier system. c) A system that is already in place, from the past. d) Old systems that often require hard-to-use command languages. e) Systems that most often have detailed information that can be accessed by a system at a higher tier.

b) A system that often holds the middle tier of a multiple-tier system.

___ of breaches are caused by stealing a password a) A low percentage (around 10%) b) A very high percentage (around 80%) c) A moderate percentage (around 25%) d) A very low percentage (somewhere around 1%) e) A high percentage (around 50%)

b) A very high percentage (around 80%)

A firm releases a new technology only to have a competitor implement a similar technology with more features and value to the consumer. This would be which type of risk? a) Demonstrating bad timing b) Awakening a sleeping giant c) Mobile-based alternative removes advantages d) Running afoul of the law e) Implementing IS poorly

b) Awakening a sleeping giant

Which is not a competitive force: a) Bargaining power of buyers b) Bargaining power of competitors c) Threat of substitute products or services d) Rivalry among existing firms e) Threat of entry of new competition

b) Bargaining power of competitors

Which of the following best describes cloud computing? a) The World Wide Web b) Computing services that can be accessed on demand across the Internet c) Mobile-based social IT d) Lightweight software that takes up little storage space e) Virtual desktop computing

b) Computing services that can be accessed on demand across the Internet

Effective, cross-cultural communication in today's global and "flattened" world is: a) Achieved by using the best available technologies b) Difficult to achieve c) Of little consequence to the organizational strategy d) No longer an issue for managers e) Easy to achieve

b) Difficult to achieve

Enterprise systems are useful for organizations seeking to do all of the following EXCEPT: a) Centralize decision making b) Encourage duplication of data c) Unify operations d) Standardize processes e) Make effective use of organizational databases

b) Encourage duplication of data

This type of organizational structure is based upon the concepts of division of labor, specialization, and unity of command. Key decisions are made at the top and filter down through the organization. a) Social b) Hierarchical c) Networked d) Matrix e) Flat

b) Hierarchical

Technology guru Tim O'Reilly said this about the publishing industry: "To adapt, publishers need to cannibalize their own business, experimenting with new forms, new formats, and new business models." This statement is consistent with: a) Generic framework b) Hypercompetition c) Direct strategy d) Porter's generic strategies e) Focus strategy

b) Hypercompetition

The plan an organization uses to provide information systems and services: a) Business Diamond b) IS Strategy c) Focus d) Cost Leadership e) Differentiation

b) IS Strategy

While information systems can be used to gain a strategic advantage, they have inherent risks. Hershey Foods, for example, crippled its Halloween sales when its complex IS system failed to support its supply and inventory needs during peak production season. This is an example of which specific IS risk? a) Awaking a sleeping giant b) Implementing IS poorly c) Demonstrating bad timing d) Running afoul of the law e) Mobile-based alternative removes advantages

b) Implementing IS poorly

The qualities found in a successful remote worker include all of the following EXCEPT: a) Self-discipline b) Ineffective communicator c) Self-starter d) Proficient in a wide range of technologies e) Socialized into the corporate culture

b) Ineffective communicator

General managers should take an active role in decisions about information systems. This is vital because: a) The IS department has not been trained to make general business decisions. b) Information systems are designed to support business objectives. c) The IS department does not have the company's best interests as its focus. d) The IS department cannot be trusted to make good decisions. e) Information systems are normally incongruent with business strategies.

b) Information systems are designed to support business objectives.

Which type of computer/IT architecture is limited to a central computer system? a) Web-services b) Mainframe c) Server-to-server d) Peer-to-peer e) Wireless

b) Mainframe

Many companies like Zara use POS to capture information on what has sold, to whom and when. This use of technology to realize efficiencies supports which one of Porter's value chain activities a) Outbound Logistics b) Marketing & Sales c) Operations d) Service e) Human resources

b) Marketing & Sales

The type of controls that will be most likely be used for remote workers is: a) Behavior b) Outcome c) Electric shock d) All of the above e) None of the above

b) Outcome

The components of enterprise architecture are: core business processes, linking and automation technology, the people who are served by the system and: ______________, a) Enterprise software b) Shared data c) IT systems d) A centralized architecture e) A framework

b) Shared data

Who is responsible for developing security education, awareness, and training programs? a) Consultants b) Shared: IT leaders and business leaders c) IT people d) Business leaders e) Team of consultants and IT people

b) Shared: IT leaders and business leaders

The managerial levers identifies the crucial, interrelated components for designing an organization. The components include all of the following EXCEPT: a) Decision rights b) Social media c) Performance measurement and evaluation d) Business processes e) Incentives and rewards

b) Social media

Which collaboration technology is becoming more and more popular both inside and outside organizations, consuming much of our attention on a day-to-day basis? a) Wikis b) Social networking on mobile devices c) Talking on mobile phones d) Intranet e) VoIP

b) Social networking on mobile devices

Understanding the life span of the IT infrastructure and architecture is called: a) IT life cycle b) Strategic timeframe c) Architecture life cycle d) IT life span e) System timeframe

b) Strategic timeframe

The dimensions of national culture include all of the following EXCEPT: a) The degree to which society engages in future-oriented behaviors b) The acceptance of technology by society c) The extent to which society tolerates uncertainty d) The distribution of power in society e) Avoidance of uncertainty

b) The acceptance of technology by society

"Reuse" is a benefit of service-oriented architecture because it supports: a) Using sensitive data again and again. b) The breaking apart of functionality into small services that can be used by many different systems. c) Reliable capacity-on-demand. d) Access to servers from many locations. e) The selection of a specific computing device by each employee.

b) The breaking apart of functionality into small services that can be used by many different systems.

To remain competitive, an organization's business strategy must adapt and respond to all of the following variables. Which variable in particular does IS help to determine? a) Organizational design b) The capabilities of the organization c) The organization's mission d) Market forces e) Customer demands

b) The capabilities of the organization

Kodak was once the largest supplier of photographic film. In 2004 it was dropped from the Dow Jones Industrial Average after having been listed for 74 years. Kodak failed to use IT to fend off which one of the following of Porter's 5 competitive forces? a) Bargaining power of suppliers b) Threat of substitute products c) Potential threat of new entrants d) Bargaining power of buyers e) Industry collaboration

b) Threat of substitute products

The system should drive the transformation in a company when: a) Advantageous processes exist in the organization. b) When the systems are in a crisis. c) The firm has competitive advantage because of its processes. d) When employees have quite a lot of knowledge about transformation in the firm. e) When a firm has been around for a long time.

b) When the systems are in a crisis.

When would an organization elect to use BPR over TQM? a) When they want to make small, incremental changes b) When they need to attain aggressive improvement goals c) When there is not a need to make significant immediate changes d) When they have time to refine their improvement goals e) When they want the employees to have control over the changes

b) When they need to attain aggressive improvement goals

Significant changes in IS should trigger a reassessment of the _____________. a) social strategy b) business strategy c) data strategy d) system strategy e) process strategy

b) business strategy

The ____________ is a plan articulating where a business seeks to go and how it expects to get there. a) stakeholder statement b) business strategy c) stockholder statement d) mission statement e) vision statement

b) business strategy

Middleware is software used to: a) provide best business practices to ERP systems. b) connect processes running on different computer systems across a network. c) connect a computer system to the network. d) support agile process redesign. e) integrate a computer's operating system and its applications.

b) connect processes running on different computer systems across a network.

When a company's business strategy and technology strategy are intertwined, this situation is known as _______. a) differentiation b) convergence c) technologically adjusted d) dynamic e) alignment

b) convergence

A matrix organization: a) Requires quite a bit of communication to be successful b) None of the above c) All of the above d) Can involve multiple bosses and multiple teams e) Were rare for quite a while but have become more common in recent years

c) All of the above

The Department of Veterans Affairs (VA) realized it did not have adequate policies, education or technology in place for remote workers when: a) Employees copied sensitive data over an unsecured network. b) Employees posted sensitive data on a public social networking site. c) An employee whose laptop carrying unencrypted, sensitive military personnel information was stolen. d) A virus from an employee's remote computer crashed the VA's intranet. e) Because of lack of coordination, all remote workers were not available for an extended period of time.

c) An employee whose laptop carrying unencrypted, sensitive military personnel information was stolen.

_________________________ is an all-encompassing tool used for modeling, building, executing and monitoring business processes that go across organizational boundaries (and often systems). a) Workflow diagrams b) SharePoint c) Business Process Management systems d) Integrated information systems e) Enterprise system

c) Business Process Management systems

This type of process reengineering uses a radical improvement method for change. a) Six Sigma b) Total Quality Management c) Business Process Reengineering d) System Development Engineering e) System Quality Management

c) Business Process Reengineering

If an organization was going to make substantial changes to its customer service department, it would use this type of transformation tool. a) System Process Control (SPC) b) Reengineering Process Control (RPC) c) Business Process Reengineering (BPR) d) Total Process Improvement (TPI) e) Engineering Control System (ECS)

c) Business Process Reengineering (BPR)

The general manager for a retail clothing outlet was recently cited as saying, "IT is the cornerstone of our company. All of our decisions are based on the sophisticated systems that we have deployed throughout our organization. IT drives our decisions." What position should the manager hold regarding IT and its influence on decision making? a) Organizational strategy should drive IS decision making. b) IT should drive business decisions. c) Business strategy should drive IS decision making d) Organizational goals should drive IT decisions. e) All strategy should be driven by IT strategy.

c) Business strategy should drive IS decision making

This architecture is a complex framework whose main objective is to map how the organization's IT supports the business processes. a) Decentralized architecture b) Centralized architecture c) Enterprise architecture d) Service-oriented architecture e) Web-based architecture

c) Enterprise architecture

Many organizations and even consumers use this to control access to a network like the Internet, allowing only authorized traffic to pass. a) VPN b) Filtering c) Firewall d) Encryption e) Anonymizing tools

c) Firewall

In which type of organizational design do middle managers do the primary information processing and communication function, telling subordinates what to do and then reporting the outcome to senior management? a) Flat b) Hybrid c) Hierarchical d) Networked e) Matrix

c) Hierarchical

Mary from sales is asking about the plan to implement Salesforce.com's application. You explain to her that you are in the process of getting technical specifications and pricing so that you can move forward with the rollout. This would be part of which of the following plans? a) IT strategy b) Server upgrade program c) IT infrastructure d) IT architecture e) System architecture

c) IT infrastructure

In the Office of Personnel Management's case, the security breach made many people vulnerable to this. a) Loss of access to personal data b) Credit card fees c) Identity theft d) Loss of personal property e) Inaccurate personal data

c) Identity theft

The qualities found in a successful remote worker include all of the following EXCEPT: a) Self-starter b) Self-discipline c) Ineffective communicator d) Socialized into the corporate culture e) Proficient in a wide range of technologies

c) Ineffective communicator

The supply chain: a) Points out the concept of weak link in an ordering process b) Helps us understand how value is built inside a single firm c) Is composed of several value chains linked into a larger chain (a chain within a chain) d) All of the above e) None of the above

c) Is composed of several value chains linked into a larger chain (a chain within a chain)

Included in the five critical elements that are used to raise security in a firm are all of the following except: a) Policies b) Training c) Law enforcement d) Investments e) Infrastructure

c) Law enforcement

A manager must know enough about the IT architecture and IT infrastructure so that he or she can: a) Choose the appropriate IT infrastructure components. b) Ensure a rigid IT structure. c) Make realistic use of IT and know what to expect from IT. d) Select the correct wireless provider. e) Limit future business options.

c) Make realistic use of IT and know what to expect from IT.

Which organization structure typically assigns workers two or more supervisors in an effort to make sure multiple dimensions of the business are integrated? a) Flat b) Networked c) Matrix d) Hierarchical e) Informal

c) Matrix

In the Anthem Blue Cross breach, where 80 million names, birthdays, social security numbers, etc., were stolen, the hackers got in by: a) Emailing each of the 80 million patients asking for their private information b) Making phone calls to insiders posing as IT people needing to log into their accounts c) Obtaining passwords of five or more high-level employees d) Breaking into the building where they were stored e) Recovering patient records from a large recycling bin

c) Obtaining passwords of five or more high-level employees

Which part of the value chain includes the manufacturing of goods? a) Inbound Logistics b) Outbound Logistics c) Operations d) Service e) Organization

c) Operations

It is estimated that ___ % of all firms have been breached: a) 5% or less b) 10% to 20% c) Over 95% d) 70% to 90% e) 40% to 60%

c) Over 95%

Facebook has for some years offered services that many individuals have adapted to, making it difficult for them to choose another social networking site. It can be said that Facebook has protected itself well from which competitive force since the beginning? a) Bargaining power of suppliers b) Threat of substitute products c) Potential threat of new entrants d) Bargaining power of buyers e) Industry collaboration

c) Potential threat of new entrants

IT has altered employees and the way they work by doing all of the following EXCEPT: a) Needing more technically knowledgeable individuals b) Supporting new ways to manage talent c) Providing distinct lines between work and play d) Creating new types of jobs e) Greatly changing day-to-day tasks

c) Providing distinct lines between work and play

An example of when a software-defined architecture is most appropriate: a) Sales are expected to be very high b) Sales are expected to be very low c) Resources need to be re-allocated dynamically depending on the situation or time of day d) BYOD is discouraged in a firm e) A firm can't make the decision and wants software to do it

c) Resources need to be re-allocated dynamically depending on the situation or time of day

The architecture that the large paper company Mohawk adopted enables the company to scale technology services up and down instantaneously according to its needs. The architecture is called: a) Mainframe b) Internet-based c) Service-oriented d) Decentralized e) Centralized

c) Service-oriented

Zara's store managers place orders that reflect their localized needs. However, order fulfillment is ultimately the responsibility of the commercial team in headquarters because: a) The commercial team has more direct contact with the designers and production. b) Store managers have no real decision rights. c) Store managers do not have visibility into regional demands but the commercial team does. d) Store managers have no access to sales information for their store. e) The commercial team does not trust the store managers.

c) Store managers do not have visibility into regional demands but the commercial team does.

Steve works for a pharmaceutical company and he specializes in marketing and sales. He generally works from home. According to the text, what type of worker is Steve? a) Mobile device b) Vagabond worker c) Telecommuter d) Contract worker e) Global worker

c) Telecommuter

Apple Inc. has developed iTunes, a unique propriety software system that supports Apple's need to delivery digital content to its customers. Apple chooses to develop iTunes rather than use an existing enterprise system solution, most likely because: a) Apple was not satisfied with the look and feel of existing enterprise systems. b) The existing solutions were developed by a fierce competitor. c) The critical process of content delivery is Apple's strategic advantage. d) It was too costly for Apple to purchase an enterprise system. e) The ability to integrate with existing enterprise systems does not exist.a

c) The critical process of content delivery is Apple's strategic advantage.

ERP systems are expensive for all of the following reasons EXCEPT: a) There is an enormous amount of work required to implement. b) The software is costly to purchase. c) They do not require business process redesign. d) They require organizational changes and impact the way people work. e) There are a number of hidden costs such as project management, training and support.

c) They do not require business process redesign.

A general manager should: a) Have a deep technical knowledge of IS b) Not be expected to ask or understand technology related questions c) Understand the use and consequences of technologies relevant to the business d) Ignore how IS are used and managed e) Rely on IS personnel to make IS decisions

c) Understand the use and consequences of technologies relevant to the business

ERP has all the following advantages except: a) Enables standardized procedures in an organization b) Reduces inconsistent data stored in various locations of the organization c) While purchasing is difficult, the vendors such as SAP make it worthwhile due to easy implementation d) Modules throughout a corporation can communicate with each other e) Have predefined software that represents "pretty good practices" or even "best practices"

c) While purchasing is difficult, the vendors such as SAP make it worthwhile due to easy implementation

A small company in Des Moines wants to set up an IT infrastructure for its workforce. The company recently moved to an older building that has solid walls and ceilings. Furthermore, most of the staff likes the flexibility of moving around the open office space to perform work on their laptops. Which communication infrastructure makes most sense for this company? a) Web-services b) Server-to-server c) Wireless d) Mainframe e) Peer-to-peer

c) Wireless

Organizational design is all about making sure that _________ are properly allocated, reflecting the structure of formal reporting relationships. a) incentives b) IS c) decision rights d) business processes e) values

c) decision rights

Organizations seek to gain a competitive advantage by differentiation, cost, or _________. a) service b) value c) focus d) profit e) speed

c) focus

A computer's hardware and ____________ specify its platform. a) software applications b) hardware c) system software d) storage e) mobility

c) system software

Google Maps is a web mapping service that provides street maps and directions. A Google Maps component can be added to a business's web site to provide customers directions to the business location. This use of Google's service by a business is an example of __________. a) Centralized architecture b) Enterprise architecture c) Service-oriented architecture d) Decentralized architecture e) Internet-based architecture

c) Service-oriented architecture

Zara strategically uses information technologies to do all of the following EXCEPT: a) Bring new products quickly to market, meeting customer demands b) Support a continuous flow of information from stores to manufacturers to distributors c) Maintain a rich, centralized repository of customer data d) Build silos of responsibilities with limited interaction between store managers, designers and market specialists e) Keep its inventory levels very low (relative to other retailers)

d) Build silos of responsibilities with limited interaction between store managers, designers and market specialists

Which one of the following is NOT a quality associated with agile and dynamic business processes? a) Readily supports changing business requirements b) Designed to support incremental improvement of processes c) Relies on a high degree of IT d) Change requires significant redesign effort e) Allows for companies to take advantage of the latest innovations

d) Change requires significant redesign effort

By using IS to achieve economies of scale and generate operating efficiencies, Walmart epitomizes which one of Porter's generic strategies? a) Differentiation b) Focus c) Cost differentiation d) Cost leadership e) Broad focus

d) Cost leadership

When an organization qualifies its product or service in a way that allows it to appear unique in the marketplace, this is called: a) Focus b) Business Strategy c) Cost Leadership d) Differentiation e) Mission

d) Differentiation

A social business strategy is designed to use social IT tools for all of the following EXCEPT: a) Building deeper connections with stakeholders b) Networking with employees, customer and/or suppliers c) Innovating with stakeholders d) Excluding stakeholders e) Collaborating with stakeholders

d) Excluding stakeholders

In which type of organizational structure is power centralized and the type of environment best supported stable and certain? a) Traditional b) Networked c) Matrix d) Hierarchical e) Flat

d) Hierarchical

Which of the following is not an organizational design variable? a) Structure b) Informal networks c) Formal reporting relationships d) IT Infrastructure e) Decision rights

d) IT Infrastructure

Marketing has repeatedly asked the IT department about the possibility of aligning the new marketing plan with the company's web site. They would like the new web site to be able to support more active content and permit customers to query an online catalog. You let them know that this is currently being considered and that you're determining if this new business strategy can be translated into a viable plan of action. This would be part of which of the following? a) System architecture b) IT infrastructure c) IT strategy d) IT architecture e) Server upgrade program

d) IT architecture

This risks of using information resources include all of the following except: a) Demonstrating bad timing b) Awakening a sleeping giant c) Implementing IS poorly d) Missing cooperative opportunities e) Failing to deliver what users want

d) Missing cooperative opportunities

Which one of the following is a valid statement? a) It takes more time to access information. b) Personal productivity has dropped as a result of technology. c) Traditional job roles have not changed much as a result of technology. d) Most jobs today have a significant information systems component. e) The cost to access information has risen.

d) Most jobs today have a significant information systems component.

If you receive an email that says it is from Sam Johnson, your boss, with an odd EXE file as an attachment, it could be dangerous for all of the following reasons except: a) It could be dangerous even if it was sent knowingly because Sam didn't know a virus might be attached. b) It could be dangerous because Sam gave someone his password once a long time ago. c) It could be dangerous because the email might not really be from Sam. d) None of the above (indicating that all are true). e) It could be dangerous because the email might be from Sam's computer without his or her knowledge.

d) None of the above (indicating that all are true).

All statements below are true about a matrix organization structure EXCEPT: a) Confusion must be dealt with through frequent meetings and conflict resolution sessions. b) The design supports both function and purpose. c) Operating complexities can be reduced by sharing information among management. d) One weakness is that multiple dimensions of a business are not integrated well with a matrix organization. e) Workers are assigned to two or more managers.

d) One weakness is that multiple dimensions of a business are not integrated well with a matrix organization.

All of the following help to develop informal networks that play an important role in an organization EXCEPT for: a) Job rotation b) Virtual communities c) Attendance at a conference d) Performance reviews e) Company softball team

d) Performance reviews

Which of the following is NOT a primary activity of the Value Chain model? a) Inbound Logistics b) Operations c) Outbound Logistics d) Purchasing e) Marketing and Sales

d) Purchasing

Using a cloud service from Amazon.com, the New York Times was able to a) Build a web-based application to search past articles for keywords. b) Standardize its virtualization infrastructure. c) Establish a strong social media presence. d) Quickly digitize old articles without needing to purchase additional infrastructure components. e) Virtualize its mobile application.

d) Quickly digitize old articles without needing to purchase additional infrastructure components.

All of the following are reasons why a company may choose to use cloud computing for its IT infrastructure EXCEPT: a) Speed to provision additional capacity b) Cost savings c) Consolidation of servers and even the elimination of a data center d) Reduce dependency on third-party suppliers e) Reduce server maintenance costs

d) Reduce dependency on third-party suppliers

Which one of the following risks can threaten the IS of a company in a highly regulated industry such as financial services or health care? a) Demonstrating bad timing b) Awakening a sleeping giant c) Mobile-based alternative removes advantages d) Running afoul of the law e) Implementing IS poorly

d) Running afoul of the law

The type of architecture where larger software programs are broken down into services which are then connected to each other, in a process called orchestration, is called: a) SAP b) OSP c) ISP d) SOA e) ERP

d) SOA

Risks associated with cloud computing include all of the following EXCEPT: a) Security b) Retooling existing applications to move to the cloud c) Increased dependency on third-party suppliers d) Scalability e) Lack of standards for virtual infrastructures

d) Scalability

It usually takes ____ for someone in a firm to discover a security compromise in a system, after the evidence shows up in logs or alerts a) Several days b) Several minutes c) Several hours d) Several months e) Several seconds

d) Several months

The Six Sigma process received its name from: a) The intersection of six bell curves, where there are no errors b) Six tries to change or give up c) Six degrees of freedom in removing an error, called "sigma" d) Six standard deviations, or less than 3.4 deects per million e) Sigma, the computer company that invented it

d) Six standard deviations, or less than 3.4 deects per million

Through the use of various technologies, a ski resort tracks the slopes each customer skis and the times he or she skis them. Skiers then have the ability to view this information online, and can choose to seamlessly share their accomplishments on Facebook. In addition, photographers positioned at the resort post pictures on Facebook for the skier. This ski resort has worked hard to develop a strong: a) Business strategy b) IS Strategy c) Customer strategy d) Social business strategy e) Organizational strategy

d) Social business strategy

At Zara, decision rights for ordering have been granted to whom? a) Central production b) The commercial team c) Headquarters d) Store managers e) Regional managers

d) Store managers

Which one of the following is NOT a factor driving the use of telecommuting? a) Higher job satisfaction b) Higher productivity c) Lower employee turnover d) Stronger sense of company culture e) Geographic flexibility

d) Stronger sense of company culture

Google has disrupted a number of industries, particularly the advertising and software industries. Google's ability to quickly and aggressively provide new products and services is best described by: a) Customer Relationship Management b) The Social Business Strategy c) The Information Systems Strategy Triangle d) The Hypercompetition Model e) Porter's Generic Strategies

d) The Hypercompetition Model

When the Office of Personnel Management was hacked, all of the following are true except: a) It took the Office of Personnel Management many months to detect the break-in b) None of the above (indicating that all are true) c) The hackers likely exploited a stolen password d) The hackers gained access to the building to steal the records e) The hackers did not need to escape in the blue turbocharged vehicle

d) The hackers gained access to the building to steal the records

ERP systems have all of the following characteristics except: a) They are implemented in all, or nearly all, large organizations b) They are difficult to implement c) Organizations use them to reduce redundancy and make better decisions d) They are expensive but are easy to use. e) They are expensive

d) They are expensive but are easy to use.

The concept of "jobs" is being replaced with the concept of work, requiring a framework that links the IS Strategy with the organization strategy to answer all of the following EXCEPT: a) Who is going to do the work? b) Where will the work be performed? c) What work will be performed? d) Who will develop the IS? e) When will the work be performed?

d) Who will develop the IS?

IS plays three important roles in management control processes. These processes are data collection, evaluation, and _______________. a) implementation b) transformation c) conversion d) communication e) management

d) communication

When a company's business strategy and technology strategy are intertwined, this situation is known as _______. a) differentiation b) technologically adjusted c) alignment d) convergence e) dynamic

d) convergence

A networked organizational structure feels both like a _______ and a _______ organizational structure because it supports a rigid structure with well-connected communication networks. a) hierarchical, hybrid b) flat, networked c) matrix, traditional d) flat, hierarchical e) matrix, flat

d) flat, hierarchical

Hypercompetition implies that any architecture must be designed with maximum scalability and _____________ to ensure it can handle the imminent business changes. a) speed b) sustainability c) availability d) flexibility e) modularity

d) flexibility

IBM has implemented a social network analysis tool that maps the _________ and the connections of IBM employees, supporting innovation by allowing employees to find others in the company with particular skills, interests or expertise. a) IS b) job descriptions c) friendships d) knowledge e) departments

d) knowledge

The physical means by which information is exchanged among hardware components is called _______. a) hardware b) software c) data d) networking e) personnel

d) networking

Examples of multi-factor authentication are: a) none of the above b) a human will chat with you to see who you are c) passwords with longer than one character d) passwords and text messages e) using two badges to allow you into a building

d) passwords and text messages

Team members who are _______________ and prefer to do several activities at one time may want to have IM or VOIP available to them so that they can communicate with their colleagues and still work on other tasks. a) synchronous b) monochronous c) bichronous d) polychronous e) asynchronous

d) polychronous

All of the follow are negative outcomes found in a firm that is set up using a functional model, EXCEPT for: a) communication gaps b) suboptimization c) lose site of the business goals d) redundancy of expertise e) lost information

d) redundancy of expertise

The most common password of all in 2014 is: a) None at all-they most commonly skip passwords and just press ENTER to continue b) "Rihanna" c) Something complex that is hard to remember d) "password" e) "123456"

e) "123456"

A legacy system is all of the following, except: a) Systems that most often have detailed information that can be accessed by a system at a higher tier. b) A system that is already in place, from the past. c) Old systems that often require hard-to-use command languages. d) Usually found on a mainframe. e) A system that often holds the middle tier of a multiple-tier system.

e) A system that often holds the middle tier of a multiple-tier system.

Which one of the following enterprise systems is social IT increasingly integrating with? a) PLM b) SCM c) ERP d) SAP e) CRM

e) CRM

A bank provides its customers mobile applications that significantly simplify traditional banking activities. For example, a customer can use a smartphone to take a picture of a check and electronically deposit into an account. This unique service demonstrates the bank's desire to practice which one of Porter's strategies? a) Focus b) Cost differentiation c) Broad focus d) Cost leadership e) Differentiation

e) Differentiation

This newer organizational design is designed to be highly flexible so that resources can be configured quickly to respond to changing demands. a) Up time organization b) Social networked organization c) Hierarchical organization d) Matrix organization e) Elastic enterprise

e) Elastic enterprise

What was involved in the American Express BlueWork program? a) Employees who are wary of newer technologies b) Employees are provided with better office facilities so they stay in the office longer c) A system that tracks the hours each employee works in a given day d) Employees can work on tasks they choose, as long as they are in the office e) Employees are provided with opportunities for flexible arrangements

e) Employees are provided with opportunities for flexible arrangements

In this business structure the firm is a hierarchy organized around a set of functions. Each group has a core competency that it concentrates upon. a) Process Control b) Business process c) Business reengineering approach d) Technology e) Functional

e) Functional

This provides a blueprint for translating a business strategy into a plan for IS. a) ERP systems b) SOA c) Centralized architecture d) IS infrastructure e) IS architecture

e) IS architecture

Which is not a prescribed area of focus for gaining competitive advantage? a) Strongholds b) Cost/Quality c) Deep Pockets d) Timing/Know-how e) Insider Information

e) Insider Information

Diversity in virtual teams increases the communication challenges. However, virtual teams with diversity have demonstrated which of the following? a) Equitable performance management. b) A high degree of self-reliance. c) Tighter security policies. d) Better compliance with deadlines. e) More creative solutions.

e) More creative solutions.

All of the following benefit from the network effect EXCEPT: a) Wikis b) Twitter c) Email d) Facebook e) Network bandwidth

e) Network bandwidth

If you receive an email that says it is from Sam Johnson, your boss, with an odd EXE file as an attachment, it could be dangerous for all of the following reasons except: a) It could be dangerous because the email might not really be from Sam. b) It could be dangerous because Sam gave someone his password once a long time ago. c) It could be dangerous because the email might be from Sam's computer without his or her knowledge. d) It could be dangerous even if it was sent knowingly because Sam didn't know a virus might be attached. e) None of the above (indicating that all are true).

e) None of the above (indicating that all are true).

While there are many advantages to working remotely, there are some potential problems. For example, once work has been successfully performed remotely, a company may find economic reasons to let go of workers and choose to _______ the work abroad. a) Automate b) Recruit c) Isolate d) Outplace e) Offshore

e) Offshore

Which one of the following is NOT part of the information systems strategy matrix? a) Software b) Hardware c) Networking d) Data e) Personnel

e) Personnel

The ____________ view considers activities that create, deliver, and support a company's product or service. a) product and service b) creation, delivery, and support model c) Asset-based d) Resource-based e) Porter value chain

e) Porter value chain

Which of the following is not an organizational structure? a) Matrix b) Flat c) Hierarchical d) Networked e) Power Distant

e) Power Distant

To help employees accept new technologies like an information system, a manager will do all of the following EXCEPT: a) Train the user on the new system b) Ensure employees find the system easy to use c) Demonstrate that the system will allow them do more or better work for the same amount of effort d) Reward users of the new system e) Provide minimal rationale for the new system

e) Provide minimal rationale for the new system

Managers in today's global, virtual workforce must rethink how they break from traditional methods of managing, particularly in the all of the following ways EXCEPT: a) Supervising employees b) Creating individual-based rewards and compensation policies c) Hiring new employees d) Evaluating an employee's contribution to a team and the company e) Setting strategic objectives

e) Setting strategic objectives

The type of software used in SOA architecture is often referred to as what? a) System-as-a-service b) Systems software c) Software-as-an-architecture d) Services-oriented architecture e) Software-as-a-service

e) Software-as-a-service

An inter-organizational relationship that affords one or more companies in the relationship a strategic advantage: a) Co-opetition b) Customer Relationship Management (CRM) c) Supply Chain Management (SCM) d) Information Resources e) Strategic Alliance

e) Strategic Alliance

This is an approach that links a company with providers of the raw components it needs to make a product or service, manufacture that product or service, and delivers it to customers. a) Value Chain Management (VCM) b) Customer Relationship Management (CRM) c) Enterprise Resource Planning (ERP) d) Product Lifecycle Management (PLM) e) Supply Chain Management (SCM)

e) Supply Chain Management (SCM)

Porter's five "Forces," used so often in the text for analysis of IT applications, include all of the following except: a) Threat of substitute products b) Bargaining power of suppliers c) Bargaining power of customers d) New entrants e) Switching costs

e) Switching costs

Which model is best used to understand the ways in which information technologies allow a firm to both attain and sustain a competitive advantage? a) Porter's Competitive Forces b) Porter's Value Chain c) The Information Systems Strategy Triangle d) The Network Effect e) The Resource-Based View

e) The Resource-Based View

All of the following are likely causes of Kaiser Permanente's difficulties before their new KPHealthConnect EXCEPT for: a) The leadership and organizational culture b) Bonus incentives not matching strategy c) Patient service processes needing to be updated and streamlined d) The alignment of the Information Systems Strategy Triangle e) The failure of automated systems

e) The failure of automated systems

Businesses today link their customers and suppliers through a single network that optimizes cost and opportunities for all. This is possible because of all of the following reasons EXCEPT: a) The ubiquity of IT b) The availability of SCM enterprise systems c) Standardized communication networks (like the Internet) d) The globalization of business e) The inability to coordinate workflow across organizational boundaries

e) The inability to coordinate workflow across organizational boundaries

The negative consequences of monitoring an employee's discrete tasks include all of the following EXCEPT: a) The privacy rights of an employee may be violated. b) The personal freedoms of the worker may be intruded upon. c) The worker can become disconnected from the larger business process. d) There can be less of an opportunity for the worker to broaden his/her skills. e) The worker feels empowered to make significant contributions to the business.

e) The worker feels empowered to make significant contributions to the business.

Shoshana Zuboff studied how papermakers' jobs were changed by the introduction of computers. What was one of her findings? a) Web portals were useful in a manufacturing context b) The workers felt empowered by the technology c) The workers sabotaged the technology d) The managers were unable to take their typical shortcuts e) The workers were no longer able to smell and squeeze the pulp, resulting in lower productivity

e) The workers were no longer able to smell and squeeze the pulp, resulting in lower productivity

A company that wants to make incremental improvements to existing business processes would utilize which of the following? a) Enterprise resource planning b) Business process management c) Business process reengineering d) Workflow management e) Total quality management

e) Total quality management

The IT infrastructure components should be evaluated based on their expected financial value. All of the following are used to quantify the financial value of IT components EXCEPT for the: a) Risks b) Costs c) Benefits d) Maintenance e) Usability

e) Usability

The cost of a data breach in 2015 is estimated to be: a) between $100 and $1,000 per record b) between $13 and $18 per record c) between $4,520 and $4,580 per record d) between $43 and 65 per record e) between $145 and $154 per record

e) between $145 and $154 per record

The organizational strategy should ideally _____ the IS strategy. a) dictate b) ignore c) drive d) sustain e) complement

e) complement

Which virtual team challenge is more difficult for managers to manage/manipulate since there may be a great deal of difference between groups and individuals? a) communication b) technology c) management d) location e) diversity

e) diversity

A challenge question is when you are stopped at the gate and the guard asks who you are. True or False?

false

An organization feels hierarchical when IT is used primarily as a communication vehicle. True or False?

false

As a result of increased flow of information, firms have seen an increase in middle managers. True or False?

false

Business processes are functional in nature and rarely cut across different departments in an organization. True or False?

false

Differences in organizational and national culture normally do not affect system development and use. True or False?

false

ERP systems are credited with establishing new business models, rather than simply making a firm improve its practices. True or False?

false

Hypercompetition refers to where a firm obtains more than 5 strong competitors. True or False?

false

If you receive an email from your son, and the body of the email tells you to open an attachment because it is funny, the risk is pretty close to zero because it came from your son. True or False?

false

It is predicted that cloud computing utilization will decrease over time. True or False?

false

National culture no longer predisposes workers to act in a certain way. True or False?

false

One of the best examples of outcome controls is the re-hiring of Steve Jobs by Apple as CEO. True or False?

false

Over time, attackers have had to increase their skills to be able to attack systems or create viruses. True or False?

false

Supply Chain Management (SCM) consists of technological components as well as a process that brings together information about customers, sales and marketing. True or False?

false

Thanks to tightened security in operating systems, it is more difficult than ever before for hackers to break into systems, compared to the early 1990s, when people were much less often protected, less aware of risks, and more easily fooled. True or False?

false

The IS strategy drives the business strategy. True or False?

false

The Process Perspective is also called the Silo perspective. True or False?

false

The Technology Acceptance Model states that the two main drivers of system use are management mandates and incentives. True or False?

false

The functional perspective keeps the "big picture" in view. True or False?

false

The idea of concurrently designing IT and business processes is out of the question. Instead, IT should be aligned with existing business processes. True or False?

false

The speed and magnitude at which organizations must make changes today continues to decrease as a result of technology. True or False?

false

The use of performance data by managers is generally welcomed by workers and nonthreatening to workers when the data is used for compensation rather than to improve performance. True or False?

false

There are very few mainframe computers still in operation today. True or False?

false

Unlike most assets, information resources do not lose value over time. True or False?

false

Virtual teams and remote work have advantages but no known disadvantages over face-to-face teams and showing up at an office. True or False?

false

A firm is usually a mix of different organizational structures, known as a hybrid structure. True or False?

true

A firm that acquires a supplier is looking to reduce the "bargaining power of suppliers" force. True or False?

true

A hacker who buys credit card information from hackers receives a short-term guarantee in case the card is declined. True or False?

true

A link between a firm's IS strategy and organizational strategy focuses more on its external requirements than internal requirements. True or False?

true

According to Thomas Friedman, collaboration is the way that small companies can "act big" and flourish in today's flat world. True or False?

true

According to the late L. Dain Gary, "You cannot make a computer secure." True or False?

true

An IT architecture with a high level of flexibility and agility will be in a position to support changing business needs. True or False?

true

An enterprise architecture is a complex framework for establishing an IT architecture and infrastructure by defining how IT supports the business processes of the firm. True or False?

true

Apple's introduction of the iPhone while iPod sales were still very strong is an example of DYB. True or False?

true

At the heart of how a business operates, you will find a collection of core business processes. True or False?

true

Cognizant needed to reinvent its organizational structure many times to make sure that it properly facilitates the flow of information between employees. True or False?

true

Digital natives are willing to take a lower-paying job with better social media access, device choice, and mobility over a higher-paying job with less technological flexibility. True or False?

true

Early computer systems were designed to support the silo perspective rather than a cross-functional business process approach. True or False?

true

Enterprise systems are large information systems that provide the core functionality needed to run a business and share data across all divisions of the business. True or False?

true

Firewalls can be either in hardware or software form. True or False?

true

For Barclay's Bank, the enterprise architecture ensures the appropriate linkage between IT investment and business needs. True or False?

true

If a technology is to be successfully implemented into an organization, either the technology must fit the organization's culture or the culture must be shaped to fit the behavioral requirements of the technology. True or False?

true

In order to maximize the effectiveness of an organization's business strategy, the manager must be able to identify and use information resources. True or False?

true

In the Target breach, the HVAC systems were actually attached to the retail sales system. True or False?

true

Knowledge-based work allows employees to work remotely rather than having to physically be present at a store, manufacturing facility or office building. True or False?

true

Personnel often react more favorable to incremental change rather than radical change because incremental change gives them control and ownership of improvements. True or False?

true

Salesforce.com is an example of SAAS (Software as a service). True or False?

true

Sloane Valve's successful effort to redesign its new product development (NPD) process can be classified as radical redesign. True or False?

true

Teams operate in one of four ways, which are represented by combinations of two dimensions: "place" vs "time," and each dimension is either "same" or "different." True or False?

true

The Deep Web is reputed to be 400 times larger than the public web. True or False?

true

The Internet greatly enhances collaboration. True or False?

true

The deep web is a part of the internet that includes unindexed websites offering both legal and illegal items, such as passports, citizenship, and even murders for hire. True or False?

true

The three major categories of IT capabilities are technical skills, management skills, and relationship skills. True or False?

true

There has been accelerated competition among market leaders concurrent with the increases in the quality and quantity of IT investments. True or False?

true

To avoid unwanted consequences, altering the IT Strategy requires adjustments to the organizational strategy.

true

You can purchase stolen credit cards on the "deep web" using a browser called "Tor." True or False?

true

Zara's use of information resources has given it a substantial advantage over its competitors. True or False?

true


Related study sets

Levels of organization (atom-molecule-cell-tissue-organ-organ-system-organism)

View Set

Acute Respiratory Distress Syndrome

View Set

CH 64 - Management of Patients with Neurologic Infections, Autoimmune Disorders, and Neuropathies

View Set

Ch. 2: The U.S. System of Constitutional Government Review

View Set

Energy Balance and Weight Control

View Set